kardel
610b4c0dee
dead code: removed (Coverity NetBSD CID 611)
2006-03-29 07:30:30 +00:00
kardel
d6c06e8308
fix as discussed in NTP Bug 584, Coverity NetBSD CID 1510
2006-03-29 07:19:34 +00:00
kardel
a1cdcab3c8
buffer overrun: backport fix from NTP project (Coverity NetBSD Scan 8: CID 1509)
2006-03-21 11:12:13 +00:00
kardel
15dc7197ee
null deref: fix another case of incomplete list handling (Coverity NetBSD Scan 8: CID 986)
2006-03-21 10:28:25 +00:00
kardel
dbefff2ee4
error handling: check success of open(2) - bail out early (Coverity CID 1282 NetBSD Scan 5)
2006-03-19 07:20:30 +00:00
kardel
24781071d1
null deref: complete linked list handling beginng condition (Coverity CID 986)
2006-03-19 07:02:47 +00:00
kardel
063cb750db
mem leak: unreachable code prevented freeing of allocated memory
...
(Coverity CID 612 NetBSD Scan 5)
2006-03-18 15:22:34 +00:00
kardel
012eaf5162
null deref: avoid 0 deref (Coverity CID 987 NetBSD Scan 5)
2006-03-18 14:33:20 +00:00
kardel
36ab9cfe6b
buffer bounds: one beyond buffer (Coverity CID 1490 NetBSD Scan 5)
2006-03-18 14:25:17 +00:00
kardel
a07906a5a8
buffer bounds: buffer full condition wrong for bounds check (Coverity CID 1508 NetBSD Scan 5)
2006-03-18 14:18:59 +00:00
kardel
630d3f115c
buffer bounds: correct > - >= error for bounds check (Coverity CID 1511 NetBSD Scan 5)
2006-03-18 14:08:29 +00:00
kardel
99c0e2540c
buffer bounds: clamp index for epobuf to buffer bounds (Coverity CID 1512 NetBSD Scan 5)
2006-03-18 14:02:13 +00:00
kardel
80b13f6f4e
mem leakage: free old malloced buffer on errors (Coverity CID 2056 NetBSD Scan 5)
2006-03-18 13:44:15 +00:00
kardel
ee0722e2b9
avoid close(-1): don't attempt to cleanup INVALID_SOCKET ( ==-1 ) fd's - would lead to close(-1) and FD_CLR((u_int)-1(!), ...) (Coverity CID 1281 NetBSD Scan 5)
2006-03-18 13:13:25 +00:00
kardel
9429ea9653
null deref: backport current ntp code to fix (Coverity CID 759)
2006-03-18 12:40:48 +00:00
kardel
58ad32062f
Coverity NetBSD scan CID 2055: fallout fix return/fclose -> fclose/return
2006-03-18 09:28:50 +00:00
kardel
e13d171a8e
resource leak (fd/mem): fclose() streams on error (Coverity NetBSD scan CID 2055)
2006-03-18 09:26:08 +00:00
kardel
589ea6e802
resource leak (fd/mem): close stream when errors occur (Coverity NetBSD Scan CID 2054)
2006-03-18 08:57:25 +00:00
kardel
862343544d
resolve CID 808 for the general case (code didn't trigger it - constant strings were supplied )
2006-03-18 08:09:03 +00:00
elad
77e1c3c1fc
Fix off-by-one, found by Coverity. CID 1466.
2006-03-18 02:35:47 +00:00
kardel
9bccbf4462
Coverity fixes:
...
CID
687 missing block
988 null pointer deref on shutdown (on open failure - introduced by
change of contract in ntp_refclock.c)
989 null pointer for private data (could not happen - safeguard anyway)
1513 off by one
2410 misplaced null pointer test
2006-03-18 00:30:30 +00:00
christos
5ca310136d
deal with const in the new openssl
2005-11-26 01:10:42 +00:00
christos
19d0f25ed5
PR/31580: Miles Nordin 'ntptime' no longer reports ERROR and UNSYNC when ntpd
...
isn't synchronized (ntpd bug #506 )
2005-10-20 15:41:01 +00:00
elad
a615d99b28
Use group-id from ``gr'' and not ``pw''.
...
Fixes security issue addressed by CAN-2005-2496.
Thanks to Adrian Portelli for notifying me about this.
2005-10-13 14:58:23 +00:00
lukem
f7e488f953
Don't attempt to use an uninitialized variable when there's no interfaces.
...
Detected with gcc -Wuninitialized.
2005-06-03 16:13:33 +00:00
riz
254aabe783
There was a change from usecs to nsecs between ntpd 4.1.1 and 4.2.0 -
...
take this into account correctly. From ntp-current via Brian Buhrow
in PR#29685. Approved by christos.
2005-05-21 01:47:09 +00:00
christos
aba19ee8af
Double the stack space limit. We are running out with ntp.pool.org.
2005-04-05 20:56:58 +00:00
lukem
c6f2cec0b0
include <isc/net.h> so that -UWANT_IPV6 compiles correctly.
2005-01-10 02:14:46 +00:00
dsl
968ad08000
Stop argument to ctype function being char
2004-10-30 15:01:32 +00:00
christos
72f840350f
PR/27210: Paul Shupak: "ntpd"'s NEMA driver has 8 units, but MAX_UNITS
...
is #defined as 4.
2004-10-10 22:13:04 +00:00
christos
766798b654
PR/27137: Martin J. Laubach: core dump when localhost does not support
...
a given address family and a peer only supports the family localhost does
not support. For example: configure a kernel without IPV6, and then
add a line in ntp.conf server <ipv6addr>. We report that the server is
unreachable and we keep going because there might be more servers around?
XXX: What if it is the last server? Should we detect this? It is not nice
to just bail on this error, because a server might lose its ipv4 address
and only advertise ipv6.
2004-10-05 03:34:38 +00:00
christos
6e1b89d727
80K of stack is not enough for a 64 bit machine, and we got crashes on
...
sparc64. change 20 * 4096 to 5 * 4096 * sizeof(void *). This is again
very little, but enough :-). If you see a crash again, don't blame the
nameserver code before you change this constant.
2004-06-29 04:16:37 +00:00
drochner
e917a2fcb1
ignore 0.0.0.0 interface addresses (dhclient leftovers)
2004-02-26 18:17:13 +00:00
fredb
8f443ee26a
Don't bother complaining about "no IPv6 interfaces" or "no IPv4 interfaces"
...
unless debugging is compiled in and enabled. Adapted from ntp-dev. Closes
PR bin/23703, by Martin Husemann.
2003-12-20 17:38:19 +00:00
keihan
9f474dc36a
Make "-s" option silent again, fixes PR bin/23707.
...
This has been fixed in current ntp-dev and also includes
some whitespace fixes. NTP bug report available at:
http://bugzilla.ntp.org/show_bug.cgi?id=263
2003-12-20 16:12:27 +00:00
drochner
a273546bc0
pull in a set of patches from ntp bk to fix the
...
"Clock stepping messes up frequency." issue
2003-12-04 17:22:31 +00:00
drochner
507fa5fee7
compile cleanly with -Wall (ntp bug #258 )
2003-12-04 17:17:36 +00:00
drochner
35f545891e
fix some memory allocation bugs (ntp bug #252 )
2003-12-04 17:15:26 +00:00
drochner
a3d91b3051
fix error handling after send errors (ntp bug #243 )
2003-12-04 17:13:11 +00:00
drochner
849e83ebc4
fix some LP64 issues (ntp bug #233 )
2003-12-04 17:10:34 +00:00
drochner
93cc3883d8
use return value of openssl's RAND_file_name(), this makes the
...
fallback to /dev/urandom work as intended by openssl
(ntp bug #234 )
2003-12-04 17:06:12 +00:00
drochner
7b3a4acbea
don't join a multicast group where we just want to send
...
(this might be preliminary, it might be intended to receive other host's
multicast in the future, but until packets are filtered properly this
fixes the "manycastclient answers requests" problem - see ntp bug #241 )
2003-12-04 17:01:32 +00:00
drochner
74a4307696
deal with sin6_scope_id where necessary
2003-12-04 16:56:01 +00:00
drochner
3cdd2cee5f
keep track of the scope id of link-local ipv6 addresses, and deal with
...
the KAME specific way to embed it into the address
(keeping the interface close to the last public bind-9.3 snapshot to
avoid conflicts in the future)
2003-12-04 16:52:28 +00:00
drochner
d5e6f1b80b
resolve conflicts
...
(in this case, throw away all local modifications; I'll start patching
from scratch)
2003-12-04 16:23:34 +00:00
drochner
b21928a34e
Import ntp 4.2.0
2003-12-04 16:05:14 +00:00
simonb
a1f8e60591
Update for CVS repo basesrc/src change (many moons ago).
2003-10-23 02:23:26 +00:00
agc
865595bdf3
Move UCB-licensed code from 4-clause to 3-clause licence.
...
Patches provided by Joel Baker in PR 22253, verified by myself.
2003-08-07 09:20:39 +00:00
cb
ee482404e6
Output key IDs in decimal, not hexadecimal, so that they can
...
be read back later.
fixes PR#14216. ok by Simon Burge (and by him via ntp distribution)
2003-07-16 12:22:58 +00:00
itojun
93851338f2
sscanf overrun
2003-05-17 01:12:28 +00:00